{
  "threat_severity" : "Moderate",
  "public_date" : "2026-03-25T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: net: usb: kalmia: validate USB endpoints",
    "id" : "2451238",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2451238"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "draft"
  },
  "cwe" : "CWE-1287",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nnet: usb: kalmia: validate USB endpoints\nThe kalmia driver should validate that the device it is probing has the\nproper number and types of USB endpoints it is expecting before it binds\nto it.  If a malicious device were to not have the same urbs the driver\nwill crash later on when it blindly accesses these endpoints.", "A flaw was found in the Linux kernel's kalmia USB driver. This vulnerability occurs because the driver does not properly validate the number and types of USB endpoints when a device is connected. A local attacker with a specially crafted malicious USB device could exploit this flaw, causing the kalmia driver to crash. This leads to a Denial of Service (DoS) on the affected system." ],
  "statement" : "This flaw affects systems with the kalmia USB modem driver loaded. The missing endpoint validation allows a malicious USB device to cause a crash when the driver blindly accesses expected endpoints that don't exist. Physical access to connect a USB device is required. The kalmia driver is for Samsung Kalmia-based LTE modems.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-23365\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-23365\nhttps://lore.kernel.org/linux-cve-announce/2026032539-CVE-2026-23365-76d3@gregkh/T" ],
  "name" : "CVE-2026-23365",
  "mitigation" : {
    "value" : "To mitigate this issue, prevent the kalmia module from being loaded. See https://access.redhat.com/solutions/41278 for instructions.",
    "lang" : "en:us"
  },
  "csaw" : false
}